Home Search
remote work - search results
If you're not happy with the results, please do another search
Millions of Bluetooth Devices Affected by BrakTooth Flaws
Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...
Hackers Target Microsoft Office Users in a New Zero-Day Attack
Researchers uncovered active exploitation of a zero-day remote code execution vulnerability in the main HTML component of the now-discontinued Internet Explorer browser. Microsoft warned...
Ransomware Vulnerabilities That Could Bring Down Your Organization
Today, 266 vulnerabilities are associated with ransomware, and attackers are increasingly exploiting these weaknesses to launch devastating ransomware attacks. Therefore, identifying and remediating these...
Ransomware – What is new?
Executives are worried. They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid.
By Ian Mann, CEO...
FBI Raises Red Alert About Hive Ransomware Group
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
Australia Passes Surveillance Legislation (Identify and Disrupt) Amendment Bill 2020
Australia is constantly trying to boost its cybersecurity capabilities to mitigate rising threats of remote access scams and identity thefts. The government recently passed...
Cybercriminals Entice Employees to Deploy Black Kingdom Ransomware
In a new kind of insider threat campaign, cybersecurity researchers found a Nigerian cybercriminal group enticing unwitting employees by offering them a share of...
Unpatched Microsoft Exchange Servers Under ProxyShell Attack
While organizations are battling to boost their cybersecurity capabilities, cybercriminals continue to prey on security loopholes. Active exploitation of unpatched vulnerabilities has become a...
Different Types of Ethical Hackers: White, Black, and Grey Hats Explained
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
“Privacy Enhancing Technologies can allow organizations to pursue data sharing while remaining compliant”
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption,...